insidejob
AML.T0055 Realized ATT&CK T1552 ↗

Unsecured Credentials

This technique has been observed in real-world attacks on AI systems.

Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. bash history), environment variables, operating system, or application-specific repositories (e.g. Credentials in Registry), or other specialized files/artifacts (e.g. private keys).